Course Brief
The globalization of the Internet has succeeded faster than anyone could have imagined. Understanding of network technologies and related issues is essential for anyone involved in developing or managing distributed systems. This course will provide an introduction to the major network technologies, protocols, algorithms and tools needed to support the development and delivery of advanced network services over networks. This course is intended for practicing or aspiring network professionals.
On successful completion of this course a student will be able to:
1 Demonstrate knowledge of network communication, OSI and TCP/IP model.
2 Demonstrate a critical understanding of the top network model with related key protocols, services, and applications.
3 Evaluate common network problems (malfunction, poor performance), adopt a systematic approach to troubleshooting and resolving the problem.
4 Be competent in the use of tools designed to analyse and simulate network functionality.
Application Layer: DHCP, DNS, TELNET and SSH, FTP and TFTP, World Wide Web and HTTP, E-Mail: SMTP, POP, IMAP, and MIME. BitTorrent, Content Delivery Networks (use case: NetFlix)
Transport Layer:
TCP: Communication with reliability, Server process, Connection management, Flow and Congestion Control, Error recovery and acknowledgement;
UDP: Low overhead versus reliability, Datagram Reassembly, Server Processes and Requests, Client Process; Stream Control Transport Protocol; TCP Friendly Rate control; Datagram Congestion Message Control; Multicast Transport Protocols.
Network Layer: IPv4 – header fields and functions; Addressing, packet forwarding & delivery, fragmentation and reassembly; Options – route recording, timestamping, source routing; Address Resolution Protocol (ARP); Internet Control Message Protocol Version 4 (ICMPv4); Routing Protocols (RIP, OSPF, and BGP); Multicasting and Multicast Routing Protocols.
Quality of Service: IntServ; DiffServ; Interoperation of InterServ & DiffServ; MPLS.
Coursework: 100% weighting, 50% pass mark.
Learning Outcomes: 1, 2, 3 & 4.
Outline Details – Report to investigate a network simulation scenario. 3,000 Words.
Formative Assessment: The globalization of the Internet has succeeded faster than anyone could have imagined. Understanding of network technologies and related issues is essential for anyone involved in developing or managing distributed systems. This course will introduce the major network technologies, protocols, algorithms and tools needed to support the development and delivery of advanced network services over networks. This course is intended for practicing or aspiring network professionals.
-
MSc Computer Forensics & Cyber Security
The MSc Computer Forensics & Cyber Security, awarded by the University of Greenwich, is structured to provide a viable option to graduates of:
- An honours degree 2:2 or above in computing or computing science or a suitable numerate subject (e.g. mathematics, physics, engineering, information systems or multimedia) that includes software development experience.
- University of Greenwich's BSc (Hons) Computing and Information System with Upper Second Class Honours or above
- Mature applicants who demonstrate academic potential and work experience can also be assessed for eligibility.
- Applicants with a similar level qualification may also be eligible for more information or email us at [email protected]
Students on the MSc Computer Forensics & Cyber Security will learn a wide range of practical and theoretical skills which will develop a sound knowledge of cyber security and its application in real life situations.
Our Computer Forensics and Cyber Security course allows students to familiarise themselves with the most recent technologies, scientific innovations and best practice in protecting digital infrastructures, from enterprise networks to Internet of Things environments. Students are also trained on modern tools and methodologies for conducting digital forensics investigations, spanning the whole range from the collection of evidence to analysis and acting as expert witnesses.
This course is suitable for both newcomers to computer security and computer forensics and practitioners who wish to further their skills. It covers practical skills for network security, penetration testing and digital forensics, as well as the theory and scientific basis that underpins everyday practice. It also ensures that students have a basic understanding of the legal and regulatory requirements and the standards pertaining to computer security.
Enrol by December 16, 2024, to receive a 10% discount.
SBCS GLI alumni(degree graduates) will receive a 5% discount.Students paying in full will receive a 5% discount.Highlights at a glance
- This programme is offered blended/online - part-time and comprises four (4) semesters
- Total duration - 2 years (Part Time)
- All material provided digitally
- Blended approach to learning with a combination of self study, online sessions and workshops
Programme Content at a glance
- Modern methods and techniques for cyber security, including penetration testing and IT auditing.
- Throughout this course you will study cyber security and digital forensics, system administration and security.
- You will learn how to apply police and forensic methods to detecting cyber crime, using related software and hardware technologies.
- This course includes hands-on training in current forensic tools as used by the police. Students can therefore contribute quickly to the well-being of corporate IT and informational assets.
- University of Greenwich is an academic partner with The Council for Registered Ethical Security Testers (CREST) and with the Chartered Institute of Information Security (CIISec).
- The degree is provisionally certified by the National Cyber Security Centre (NCSC), a part of GCHQ.
At SBCS we focus on
- Producing graduates who are capable of thinking critically, creatively and ethically.
- Graduates that can contribute to emerging industries and societal development.
- Read what some of our graduates have to say.